Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 05:47

General

  • Target

    $PROGRAM_FILES_COMMON/Borland Shared/BDE/idapinst.dll

  • Size

    111KB

  • MD5

    96a9675ef362b107205a3ac894be81b5

  • SHA1

    e71a3ee0b1e1213fc21ae50b1816c8f8f4e2d037

  • SHA256

    d355ee6482a7726e874ab49f59f6d3bcc981e5aaf196bd915cc6841e0f163b17

  • SHA512

    cf7a5cb179d93723216454188980a7de5aa26f7c02fde61d127880533f64c175ad9bc370ad18f0feb141d8cd682d43b0a2ad20893c9576d5c79cbfc9c4a33454

  • SSDEEP

    1536:pT8jaZ1sAkSDdoRg6FxU7Zzk8h0xwWVrhGsVtv0rQCTmoECTa4:Lked+NFNu6wWVrXVtvST8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\$PROGRAM_FILES_COMMON\Borland Shared\BDE\idapinst.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\$PROGRAM_FILES_COMMON\Borland Shared\BDE\idapinst.dll",#1
      2⤵
      • Enumerates connected drives
      PID:836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-0-0x000000004BDE0000-0x000000004BE7A000-memory.dmp

    Filesize

    616KB